Skip to content

Commit da57aaa

Browse files
[5.2.x] Added CVE-2026-3902, CVE-2026-4277, CVE-2026-4292, CVE-2026-33033, and CVE-2026-33034 to security archive.
Backport of 3330dc2 from main.
1 parent c9a8bdb commit da57aaa

1 file changed

Lines changed: 57 additions & 0 deletions

File tree

docs/releases/security.txt

Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,63 @@ Issues under Django's security process
3636
All security issues have been handled under versions of Django's security
3737
process. These are listed below.
3838

39+
April 7, 2026 - :cve:`2026-3902`
40+
--------------------------------
41+
42+
ASGI header spoofing via underscore/hyphen conflation.
43+
`Full description
44+
<https://www.djangoproject.com/weblog/2026/apr/07/security-releases/>`__
45+
46+
* Django 6.0 :commit:`(patch) <a623c3982857e80324448f85c7faf9a6710330ef>`
47+
* Django 5.2 :commit:`(patch) <1cc2a7612f97c109b92415fc11ba9bd0501852e0>`
48+
* Django 4.2 :commit:`(patch) <4412731aa64d62a6dd7edae79e0c15b72666d7ca>`
49+
50+
April 7, 2026 - :cve:`2026-4277`
51+
--------------------------------
52+
53+
Privilege abuse in ``GenericInlineModelAdmin``.
54+
`Full description
55+
<https://www.djangoproject.com/weblog/2026/apr/07/security-releases/>`__
56+
57+
* Django 6.0 :commit:`(patch) <08a752c1cd8f378b4c64d96c319da23726df6ed3>`
58+
* Django 5.2 :commit:`(patch) <60ffa957c427e10a2eb0fc80d1674a8a8ccc30b0>`
59+
* Django 4.2 :commit:`(patch) <051f3909e820360bbe84a21350e82f4961e3d917>`
60+
61+
April 7, 2026 - :cve:`2026-4292`
62+
--------------------------------
63+
64+
Privilege abuse in ``ModelAdmin.list_editable``.
65+
`Full description
66+
<https://www.djangoproject.com/weblog/2026/apr/07/security-releases/>`__
67+
68+
* Django 6.0 :commit:`(patch) <428c48f358c5a0ed5ca2834fb721d615eb2b0e11>`
69+
* Django 5.2 :commit:`(patch) <397c22048244db2cd4bb78f570e6c72a3967bf36>`
70+
* Django 4.2 :commit:`(patch) <abfe1a1c57a57cfaf6dd4a0571c029401a0fe743>`
71+
72+
April 7, 2026 - :cve:`2026-33033`
73+
---------------------------------
74+
75+
Potential denial-of-service vulnerability in ``MultiPartParser`` via
76+
base64-encoded file upload.
77+
`Full description
78+
<https://www.djangoproject.com/weblog/2026/apr/07/security-releases/>`__
79+
80+
* Django 6.0 :commit:`(patch) <0910af60468216c856dfbcac1177372c225deb76>`
81+
* Django 5.2 :commit:`(patch) <0b467893bdde69a2d23034338e76021a1e4f4322>`
82+
* Django 4.2 :commit:`(patch) <f13c20f81b56108ac477213fa5ada2524b5e5c98>`
83+
84+
April 7, 2026 - :cve:`2026-33034`
85+
---------------------------------
86+
87+
Potential denial-of-service vulnerability in ASGI requests via memory upload
88+
limit bypass.
89+
`Full description
90+
<https://www.djangoproject.com/weblog/2026/apr/07/security-releases/>`__
91+
92+
* Django 6.0 :commit:`(patch) <393dbc53e848876fdba92fbf02e10ee6a6eace6b>`
93+
* Django 5.2 :commit:`(patch) <49e1e2b548999a35a025f9682598946bda9e9921>`
94+
* Django 4.2 :commit:`(patch) <ed4dfda62718a0bb644b80ac8b1d3099861f2295>`
95+
3996
March 3, 2026 - :cve:`2026-25673`
4097
---------------------------------
4198

0 commit comments

Comments
 (0)